2346 lines
78 KiB
C
2346 lines
78 KiB
C
|
// SPDX-License-Identifier: GPL-2.0-only
|
||
|
/****************************************************************************
|
||
|
* Driver for Solarflare network controllers and boards
|
||
|
* Copyright 2019 Solarflare Communications Inc.
|
||
|
* Copyright 2020-2022 Xilinx Inc.
|
||
|
*
|
||
|
* This program is free software; you can redistribute it and/or modify it
|
||
|
* under the terms of the GNU General Public License version 2 as published
|
||
|
* by the Free Software Foundation, incorporated herein by reference.
|
||
|
*/
|
||
|
|
||
|
#include <linux/rhashtable.h>
|
||
|
#include "ef100_nic.h"
|
||
|
#include "mae.h"
|
||
|
#include "mcdi.h"
|
||
|
#include "mcdi_pcol.h"
|
||
|
#include "mcdi_pcol_mae.h"
|
||
|
#include "tc_encap_actions.h"
|
||
|
#include "tc_conntrack.h"
|
||
|
|
||
|
int efx_mae_allocate_mport(struct efx_nic *efx, u32 *id, u32 *label)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MPORT_ALLOC_ALIAS_OUT_LEN);
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_ALLOC_ALIAS_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
if (WARN_ON_ONCE(!id))
|
||
|
return -EINVAL;
|
||
|
if (WARN_ON_ONCE(!label))
|
||
|
return -EINVAL;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_MPORT_ALLOC_ALIAS_IN_TYPE,
|
||
|
MC_CMD_MAE_MPORT_ALLOC_ALIAS_IN_MPORT_TYPE_ALIAS);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_MPORT_ALLOC_ALIAS_IN_DELIVER_MPORT,
|
||
|
MAE_MPORT_SELECTOR_ASSIGNED);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_ALLOC, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
*id = MCDI_DWORD(outbuf, MAE_MPORT_ALLOC_ALIAS_OUT_MPORT_ID);
|
||
|
*label = MCDI_DWORD(outbuf, MAE_MPORT_ALLOC_ALIAS_OUT_LABEL);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_free_mport(struct efx_nic *efx, u32 id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_FREE_IN_LEN);
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_MPORT_FREE_OUT_LEN);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_MPORT_FREE_IN_MPORT_ID, id);
|
||
|
return efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_FREE, inbuf, sizeof(inbuf),
|
||
|
NULL, 0, NULL);
|
||
|
}
|
||
|
|
||
|
void efx_mae_mport_wire(struct efx_nic *efx, u32 *out)
|
||
|
{
|
||
|
efx_dword_t mport;
|
||
|
|
||
|
EFX_POPULATE_DWORD_2(mport,
|
||
|
MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_PPORT,
|
||
|
MAE_MPORT_SELECTOR_PPORT_ID, efx->port_num);
|
||
|
*out = EFX_DWORD_VAL(mport);
|
||
|
}
|
||
|
|
||
|
void efx_mae_mport_uplink(struct efx_nic *efx __always_unused, u32 *out)
|
||
|
{
|
||
|
efx_dword_t mport;
|
||
|
|
||
|
EFX_POPULATE_DWORD_3(mport,
|
||
|
MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_FUNC,
|
||
|
MAE_MPORT_SELECTOR_FUNC_PF_ID, MAE_MPORT_SELECTOR_FUNC_PF_ID_CALLER,
|
||
|
MAE_MPORT_SELECTOR_FUNC_VF_ID, MAE_MPORT_SELECTOR_FUNC_VF_ID_NULL);
|
||
|
*out = EFX_DWORD_VAL(mport);
|
||
|
}
|
||
|
|
||
|
void efx_mae_mport_vf(struct efx_nic *efx __always_unused, u32 vf_id, u32 *out)
|
||
|
{
|
||
|
efx_dword_t mport;
|
||
|
|
||
|
EFX_POPULATE_DWORD_3(mport,
|
||
|
MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_FUNC,
|
||
|
MAE_MPORT_SELECTOR_FUNC_PF_ID, MAE_MPORT_SELECTOR_FUNC_PF_ID_CALLER,
|
||
|
MAE_MPORT_SELECTOR_FUNC_VF_ID, vf_id);
|
||
|
*out = EFX_DWORD_VAL(mport);
|
||
|
}
|
||
|
|
||
|
/* Constructs an mport selector from an mport ID, because they're not the same */
|
||
|
void efx_mae_mport_mport(struct efx_nic *efx __always_unused, u32 mport_id, u32 *out)
|
||
|
{
|
||
|
efx_dword_t mport;
|
||
|
|
||
|
EFX_POPULATE_DWORD_2(mport,
|
||
|
MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_MPORT_ID,
|
||
|
MAE_MPORT_SELECTOR_MPORT_ID, mport_id);
|
||
|
*out = EFX_DWORD_VAL(mport);
|
||
|
}
|
||
|
|
||
|
/* id is really only 24 bits wide */
|
||
|
int efx_mae_fw_lookup_mport(struct efx_nic *efx, u32 selector, u32 *id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MPORT_LOOKUP_OUT_LEN);
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_LOOKUP_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_MPORT_LOOKUP_IN_MPORT_SELECTOR, selector);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_LOOKUP, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
*id = MCDI_DWORD(outbuf, MAE_MPORT_LOOKUP_OUT_MPORT_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_start_counters(struct efx_nic *efx, struct efx_rx_queue *rx_queue)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTERS_STREAM_START_V2_IN_LEN);
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTERS_STREAM_START_OUT_LEN);
|
||
|
u32 out_flags;
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_WORD(inbuf, MAE_COUNTERS_STREAM_START_V2_IN_QID,
|
||
|
efx_rx_queue_index(rx_queue));
|
||
|
MCDI_SET_WORD(inbuf, MAE_COUNTERS_STREAM_START_V2_IN_PACKET_SIZE,
|
||
|
efx->net_dev->mtu);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTERS_STREAM_START_V2_IN_COUNTER_TYPES_MASK,
|
||
|
BIT(MAE_COUNTER_TYPE_AR) | BIT(MAE_COUNTER_TYPE_CT) |
|
||
|
BIT(MAE_COUNTER_TYPE_OR));
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTERS_STREAM_START,
|
||
|
inbuf, sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
out_flags = MCDI_DWORD(outbuf, MAE_COUNTERS_STREAM_START_OUT_FLAGS);
|
||
|
if (out_flags & BIT(MC_CMD_MAE_COUNTERS_STREAM_START_OUT_USES_CREDITS_OFST)) {
|
||
|
netif_dbg(efx, drv, efx->net_dev,
|
||
|
"MAE counter stream uses credits\n");
|
||
|
rx_queue->grant_credits = true;
|
||
|
out_flags &= ~BIT(MC_CMD_MAE_COUNTERS_STREAM_START_OUT_USES_CREDITS_OFST);
|
||
|
}
|
||
|
if (out_flags) {
|
||
|
netif_err(efx, drv, efx->net_dev,
|
||
|
"MAE counter stream start: unrecognised flags %x\n",
|
||
|
out_flags);
|
||
|
goto out_stop;
|
||
|
}
|
||
|
return 0;
|
||
|
out_stop:
|
||
|
efx_mae_stop_counters(efx, rx_queue);
|
||
|
return -EOPNOTSUPP;
|
||
|
}
|
||
|
|
||
|
static bool efx_mae_counters_flushed(u32 *flush_gen, u32 *seen_gen)
|
||
|
{
|
||
|
int i;
|
||
|
|
||
|
for (i = 0; i < EFX_TC_COUNTER_TYPE_MAX; i++)
|
||
|
if ((s32)(flush_gen[i] - seen_gen[i]) > 0)
|
||
|
return false;
|
||
|
return true;
|
||
|
}
|
||
|
|
||
|
int efx_mae_stop_counters(struct efx_nic *efx, struct efx_rx_queue *rx_queue)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTERS_STREAM_STOP_V2_OUT_LENMAX);
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTERS_STREAM_STOP_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc, i;
|
||
|
|
||
|
MCDI_SET_WORD(inbuf, MAE_COUNTERS_STREAM_STOP_IN_QID,
|
||
|
efx_rx_queue_index(rx_queue));
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTERS_STREAM_STOP,
|
||
|
inbuf, sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
|
||
|
netif_dbg(efx, drv, efx->net_dev, "Draining counters:\n");
|
||
|
/* Only process received generation counts */
|
||
|
for (i = 0; (i < (outlen / 4)) && (i < EFX_TC_COUNTER_TYPE_MAX); i++) {
|
||
|
efx->tc->flush_gen[i] = MCDI_ARRAY_DWORD(outbuf,
|
||
|
MAE_COUNTERS_STREAM_STOP_V2_OUT_GENERATION_COUNT,
|
||
|
i);
|
||
|
netif_dbg(efx, drv, efx->net_dev,
|
||
|
"\ttype %u, awaiting gen %u\n", i,
|
||
|
efx->tc->flush_gen[i]);
|
||
|
}
|
||
|
|
||
|
efx->tc->flush_counters = true;
|
||
|
|
||
|
/* Drain can take up to 2 seconds owing to FWRIVERHD-2884; whatever
|
||
|
* timeout we use, that delay is added to unload on nonresponsive
|
||
|
* hardware, so 2500ms seems like a reasonable compromise.
|
||
|
*/
|
||
|
if (!wait_event_timeout(efx->tc->flush_wq,
|
||
|
efx_mae_counters_flushed(efx->tc->flush_gen,
|
||
|
efx->tc->seen_gen),
|
||
|
msecs_to_jiffies(2500)))
|
||
|
netif_warn(efx, drv, efx->net_dev,
|
||
|
"Failed to drain counters RXQ, FW may be unhappy\n");
|
||
|
|
||
|
efx->tc->flush_counters = false;
|
||
|
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
void efx_mae_counters_grant_credits(struct work_struct *work)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTERS_STREAM_GIVE_CREDITS_IN_LEN);
|
||
|
struct efx_rx_queue *rx_queue = container_of(work, struct efx_rx_queue,
|
||
|
grant_work);
|
||
|
struct efx_nic *efx = rx_queue->efx;
|
||
|
unsigned int credits;
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_COUNTERS_STREAM_GIVE_CREDITS_OUT_LEN);
|
||
|
credits = READ_ONCE(rx_queue->notified_count) - rx_queue->granted_count;
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTERS_STREAM_GIVE_CREDITS_IN_NUM_CREDITS,
|
||
|
credits);
|
||
|
if (!efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTERS_STREAM_GIVE_CREDITS,
|
||
|
inbuf, sizeof(inbuf), NULL, 0, NULL))
|
||
|
rx_queue->granted_count += credits;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_table_get_desc(struct efx_nic *efx,
|
||
|
struct efx_tc_table_desc *desc,
|
||
|
u32 table_id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_TABLE_DESCRIPTOR_OUT_LEN(16));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_TABLE_DESCRIPTOR_IN_LEN);
|
||
|
unsigned int offset = 0, i;
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
memset(desc, 0, sizeof(*desc));
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, TABLE_DESCRIPTOR_IN_TABLE_ID, table_id);
|
||
|
more:
|
||
|
MCDI_SET_DWORD(inbuf, TABLE_DESCRIPTOR_IN_FIRST_FIELDS_INDEX, offset);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_DESCRIPTOR, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
goto fail;
|
||
|
if (outlen < MC_CMD_TABLE_DESCRIPTOR_OUT_LEN(1)) {
|
||
|
rc = -EIO;
|
||
|
goto fail;
|
||
|
}
|
||
|
if (!offset) { /* first iteration: get metadata */
|
||
|
desc->type = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_TYPE);
|
||
|
desc->key_width = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_KEY_WIDTH);
|
||
|
desc->resp_width = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_RESP_WIDTH);
|
||
|
desc->n_keys = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_N_KEY_FIELDS);
|
||
|
desc->n_resps = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_N_RESP_FIELDS);
|
||
|
desc->n_prios = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_N_PRIORITIES);
|
||
|
desc->flags = MCDI_BYTE(outbuf, TABLE_DESCRIPTOR_OUT_FLAGS);
|
||
|
rc = -EOPNOTSUPP;
|
||
|
if (desc->flags)
|
||
|
goto fail;
|
||
|
desc->scheme = MCDI_BYTE(outbuf, TABLE_DESCRIPTOR_OUT_SCHEME);
|
||
|
if (desc->scheme)
|
||
|
goto fail;
|
||
|
rc = -ENOMEM;
|
||
|
desc->keys = kcalloc(desc->n_keys,
|
||
|
sizeof(struct efx_tc_table_field_fmt),
|
||
|
GFP_KERNEL);
|
||
|
if (!desc->keys)
|
||
|
goto fail;
|
||
|
desc->resps = kcalloc(desc->n_resps,
|
||
|
sizeof(struct efx_tc_table_field_fmt),
|
||
|
GFP_KERNEL);
|
||
|
if (!desc->resps)
|
||
|
goto fail;
|
||
|
}
|
||
|
/* FW could have returned more than the 16 field_descrs we
|
||
|
* made room for in our outbuf
|
||
|
*/
|
||
|
outlen = min(outlen, sizeof(outbuf));
|
||
|
for (i = 0; i + offset < desc->n_keys + desc->n_resps; i++) {
|
||
|
struct efx_tc_table_field_fmt *field;
|
||
|
MCDI_DECLARE_STRUCT_PTR(fdesc);
|
||
|
|
||
|
if (outlen < MC_CMD_TABLE_DESCRIPTOR_OUT_LEN(i + 1)) {
|
||
|
offset += i;
|
||
|
goto more;
|
||
|
}
|
||
|
if (i + offset < desc->n_keys)
|
||
|
field = desc->keys + i + offset;
|
||
|
else
|
||
|
field = desc->resps + (i + offset - desc->n_keys);
|
||
|
fdesc = MCDI_ARRAY_STRUCT_PTR(outbuf,
|
||
|
TABLE_DESCRIPTOR_OUT_FIELDS, i);
|
||
|
field->field_id = MCDI_STRUCT_WORD(fdesc,
|
||
|
TABLE_FIELD_DESCR_FIELD_ID);
|
||
|
field->lbn = MCDI_STRUCT_WORD(fdesc, TABLE_FIELD_DESCR_LBN);
|
||
|
field->width = MCDI_STRUCT_WORD(fdesc, TABLE_FIELD_DESCR_WIDTH);
|
||
|
field->masking = MCDI_STRUCT_BYTE(fdesc, TABLE_FIELD_DESCR_MASK_TYPE);
|
||
|
field->scheme = MCDI_STRUCT_BYTE(fdesc, TABLE_FIELD_DESCR_SCHEME);
|
||
|
}
|
||
|
return 0;
|
||
|
|
||
|
fail:
|
||
|
kfree(desc->keys);
|
||
|
kfree(desc->resps);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_table_hook_find(u16 n_fields,
|
||
|
struct efx_tc_table_field_fmt *fields,
|
||
|
u16 field_id)
|
||
|
{
|
||
|
unsigned int i;
|
||
|
|
||
|
for (i = 0; i < n_fields; i++) {
|
||
|
if (fields[i].field_id == field_id)
|
||
|
return i;
|
||
|
}
|
||
|
return -EPROTO;
|
||
|
}
|
||
|
|
||
|
#define TABLE_FIND_KEY(_desc, _id) \
|
||
|
efx_mae_table_hook_find((_desc)->n_keys, (_desc)->keys, _id)
|
||
|
#define TABLE_FIND_RESP(_desc, _id) \
|
||
|
efx_mae_table_hook_find((_desc)->n_resps, (_desc)->resps, _id)
|
||
|
|
||
|
#define TABLE_HOOK_KEY(_meta, _name, _mcdi_name) ({ \
|
||
|
int _rc = TABLE_FIND_KEY(&_meta->desc, TABLE_FIELD_ID_##_mcdi_name); \
|
||
|
\
|
||
|
if (_rc > U8_MAX) \
|
||
|
_rc = -EOPNOTSUPP; \
|
||
|
if (_rc >= 0) { \
|
||
|
_meta->keys._name##_idx = _rc; \
|
||
|
_rc = 0; \
|
||
|
} \
|
||
|
_rc; \
|
||
|
})
|
||
|
#define TABLE_HOOK_RESP(_meta, _name, _mcdi_name) ({ \
|
||
|
int _rc = TABLE_FIND_RESP(&_meta->desc, TABLE_FIELD_ID_##_mcdi_name); \
|
||
|
\
|
||
|
if (_rc > U8_MAX) \
|
||
|
_rc = -EOPNOTSUPP; \
|
||
|
if (_rc >= 0) { \
|
||
|
_meta->resps._name##_idx = _rc; \
|
||
|
_rc = 0; \
|
||
|
} \
|
||
|
_rc; \
|
||
|
})
|
||
|
|
||
|
static int efx_mae_table_hook_ct(struct efx_nic *efx,
|
||
|
struct efx_tc_table_ct *meta_ct)
|
||
|
{
|
||
|
int rc;
|
||
|
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, eth_proto, ETHER_TYPE);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, ip_proto, IP_PROTO);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, src_ip, SRC_IP);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, dst_ip, DST_IP);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, l4_sport, SRC_PORT);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, l4_dport, DST_PORT);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_KEY(meta_ct, zone, DOMAIN);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_RESP(meta_ct, dnat, NAT_DIR);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_RESP(meta_ct, nat_ip, NAT_IP);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_RESP(meta_ct, l4_natport, NAT_PORT);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_RESP(meta_ct, mark, CT_MARK);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_HOOK_RESP(meta_ct, counter_id, COUNTER_ID);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
meta_ct->hooked = true;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static void efx_mae_table_free_desc(struct efx_tc_table_desc *desc)
|
||
|
{
|
||
|
kfree(desc->keys);
|
||
|
kfree(desc->resps);
|
||
|
memset(desc, 0, sizeof(*desc));
|
||
|
}
|
||
|
|
||
|
static bool efx_mae_check_table_exists(struct efx_nic *efx, u32 tbl_req)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_TABLE_LIST_OUT_LEN(16));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_TABLE_LIST_IN_LEN);
|
||
|
u32 tbl_id, tbl_total, tbl_cnt, pos = 0;
|
||
|
size_t outlen, msg_max;
|
||
|
bool ct_tbl = false;
|
||
|
int rc, idx;
|
||
|
|
||
|
msg_max = sizeof(outbuf);
|
||
|
efx->tc->meta_ct.hooked = false;
|
||
|
more:
|
||
|
memset(outbuf, 0, sizeof(*outbuf));
|
||
|
MCDI_SET_DWORD(inbuf, TABLE_LIST_IN_FIRST_TABLE_ID_INDEX, pos);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_LIST, inbuf, sizeof(inbuf), outbuf,
|
||
|
msg_max, &outlen);
|
||
|
if (rc)
|
||
|
return false;
|
||
|
|
||
|
if (outlen < MC_CMD_TABLE_LIST_OUT_LEN(1))
|
||
|
return false;
|
||
|
|
||
|
tbl_total = MCDI_DWORD(outbuf, TABLE_LIST_OUT_N_TABLES);
|
||
|
tbl_cnt = MC_CMD_TABLE_LIST_OUT_TABLE_ID_NUM(min(outlen, msg_max));
|
||
|
|
||
|
for (idx = 0; idx < tbl_cnt; idx++) {
|
||
|
tbl_id = MCDI_ARRAY_DWORD(outbuf, TABLE_LIST_OUT_TABLE_ID, idx);
|
||
|
if (tbl_id == tbl_req) {
|
||
|
ct_tbl = true;
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
pos += tbl_cnt;
|
||
|
if (!ct_tbl && pos < tbl_total)
|
||
|
goto more;
|
||
|
|
||
|
return ct_tbl;
|
||
|
}
|
||
|
|
||
|
int efx_mae_get_tables(struct efx_nic *efx)
|
||
|
{
|
||
|
int rc;
|
||
|
|
||
|
efx->tc->meta_ct.hooked = false;
|
||
|
if (efx_mae_check_table_exists(efx, TABLE_ID_CONNTRACK_TABLE)) {
|
||
|
rc = efx_mae_table_get_desc(efx, &efx->tc->meta_ct.desc,
|
||
|
TABLE_ID_CONNTRACK_TABLE);
|
||
|
if (rc) {
|
||
|
pci_info(efx->pci_dev,
|
||
|
"FW does not support conntrack desc rc %d\n",
|
||
|
rc);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
rc = efx_mae_table_hook_ct(efx, &efx->tc->meta_ct);
|
||
|
if (rc) {
|
||
|
pci_info(efx->pci_dev,
|
||
|
"FW does not support conntrack hook rc %d\n",
|
||
|
rc);
|
||
|
return 0;
|
||
|
}
|
||
|
} else {
|
||
|
pci_info(efx->pci_dev,
|
||
|
"FW does not support conntrack table\n");
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
void efx_mae_free_tables(struct efx_nic *efx)
|
||
|
{
|
||
|
efx_mae_table_free_desc(&efx->tc->meta_ct.desc);
|
||
|
efx->tc->meta_ct.hooked = false;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_get_basic_caps(struct efx_nic *efx, struct mae_caps *caps)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_GET_CAPS_OUT_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_GET_CAPS_IN_LEN);
|
||
|
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_GET_CAPS, NULL, 0, outbuf,
|
||
|
sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
caps->match_field_count = MCDI_DWORD(outbuf, MAE_GET_CAPS_OUT_MATCH_FIELD_COUNT);
|
||
|
caps->encap_types = MCDI_DWORD(outbuf, MAE_GET_CAPS_OUT_ENCAP_TYPES_SUPPORTED);
|
||
|
caps->action_prios = MCDI_DWORD(outbuf, MAE_GET_CAPS_OUT_ACTION_PRIOS);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_get_rule_fields(struct efx_nic *efx, u32 cmd,
|
||
|
u8 *field_support)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_GET_AR_CAPS_OUT_LEN(MAE_NUM_FIELDS));
|
||
|
MCDI_DECLARE_STRUCT_PTR(caps);
|
||
|
unsigned int count;
|
||
|
size_t outlen;
|
||
|
int rc, i;
|
||
|
|
||
|
/* AR and OR caps MCDIs have identical layout, so we are using the
|
||
|
* same code for both.
|
||
|
*/
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_OUT_LEN(MAE_NUM_FIELDS) <
|
||
|
MC_CMD_MAE_GET_OR_CAPS_OUT_LEN(MAE_NUM_FIELDS));
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_IN_LEN);
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_GET_OR_CAPS_IN_LEN);
|
||
|
|
||
|
rc = efx_mcdi_rpc(efx, cmd, NULL, 0, outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_OUT_COUNT_OFST !=
|
||
|
MC_CMD_MAE_GET_OR_CAPS_OUT_COUNT_OFST);
|
||
|
count = MCDI_DWORD(outbuf, MAE_GET_AR_CAPS_OUT_COUNT);
|
||
|
memset(field_support, MAE_FIELD_UNSUPPORTED, MAE_NUM_FIELDS);
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_OUT_FIELD_FLAGS_OFST !=
|
||
|
MC_CMD_MAE_GET_OR_CAPS_OUT_FIELD_FLAGS_OFST);
|
||
|
caps = _MCDI_DWORD(outbuf, MAE_GET_AR_CAPS_OUT_FIELD_FLAGS);
|
||
|
/* We're only interested in the support status enum, not any other
|
||
|
* flags, so just extract that from each entry.
|
||
|
*/
|
||
|
for (i = 0; i < count; i++)
|
||
|
if (i * sizeof(*outbuf) + MC_CMD_MAE_GET_AR_CAPS_OUT_FIELD_FLAGS_OFST < outlen)
|
||
|
field_support[i] = EFX_DWORD_FIELD(caps[i], MAE_FIELD_FLAGS_SUPPORT_STATUS);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_get_caps(struct efx_nic *efx, struct mae_caps *caps)
|
||
|
{
|
||
|
int rc;
|
||
|
|
||
|
rc = efx_mae_get_basic_caps(efx, caps);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = efx_mae_get_rule_fields(efx, MC_CMD_MAE_GET_AR_CAPS,
|
||
|
caps->action_rule_fields);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
return efx_mae_get_rule_fields(efx, MC_CMD_MAE_GET_OR_CAPS,
|
||
|
caps->outer_rule_fields);
|
||
|
}
|
||
|
|
||
|
/* Bit twiddling:
|
||
|
* Prefix: 1...110...0
|
||
|
* ~: 0...001...1
|
||
|
* + 1: 0...010...0 is power of two
|
||
|
* so (~x) & ((~x) + 1) == 0. Converse holds also.
|
||
|
*/
|
||
|
#define is_prefix_byte(_x) !(((_x) ^ 0xff) & (((_x) ^ 0xff) + 1))
|
||
|
|
||
|
enum mask_type { MASK_ONES, MASK_ZEROES, MASK_PREFIX, MASK_OTHER };
|
||
|
|
||
|
static const char *mask_type_name(enum mask_type typ)
|
||
|
{
|
||
|
switch (typ) {
|
||
|
case MASK_ONES:
|
||
|
return "all-1s";
|
||
|
case MASK_ZEROES:
|
||
|
return "all-0s";
|
||
|
case MASK_PREFIX:
|
||
|
return "prefix";
|
||
|
case MASK_OTHER:
|
||
|
return "arbitrary";
|
||
|
default: /* can't happen */
|
||
|
return "unknown";
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* Checks a (big-endian) bytestring is a bit prefix */
|
||
|
static enum mask_type classify_mask(const u8 *mask, size_t len)
|
||
|
{
|
||
|
bool zeroes = true; /* All bits seen so far are zeroes */
|
||
|
bool ones = true; /* All bits seen so far are ones */
|
||
|
bool prefix = true; /* Valid prefix so far */
|
||
|
size_t i;
|
||
|
|
||
|
for (i = 0; i < len; i++) {
|
||
|
if (ones) {
|
||
|
if (!is_prefix_byte(mask[i]))
|
||
|
prefix = false;
|
||
|
} else if (mask[i]) {
|
||
|
prefix = false;
|
||
|
}
|
||
|
if (mask[i] != 0xff)
|
||
|
ones = false;
|
||
|
if (mask[i])
|
||
|
zeroes = false;
|
||
|
}
|
||
|
if (ones)
|
||
|
return MASK_ONES;
|
||
|
if (zeroes)
|
||
|
return MASK_ZEROES;
|
||
|
if (prefix)
|
||
|
return MASK_PREFIX;
|
||
|
return MASK_OTHER;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_match_check_cap_typ(u8 support, enum mask_type typ)
|
||
|
{
|
||
|
switch (support) {
|
||
|
case MAE_FIELD_UNSUPPORTED:
|
||
|
case MAE_FIELD_SUPPORTED_MATCH_NEVER:
|
||
|
if (typ == MASK_ZEROES)
|
||
|
return 0;
|
||
|
return -EOPNOTSUPP;
|
||
|
case MAE_FIELD_SUPPORTED_MATCH_OPTIONAL:
|
||
|
if (typ == MASK_ZEROES)
|
||
|
return 0;
|
||
|
fallthrough;
|
||
|
case MAE_FIELD_SUPPORTED_MATCH_ALWAYS:
|
||
|
if (typ == MASK_ONES)
|
||
|
return 0;
|
||
|
return -EINVAL;
|
||
|
case MAE_FIELD_SUPPORTED_MATCH_PREFIX:
|
||
|
if (typ == MASK_OTHER)
|
||
|
return -EOPNOTSUPP;
|
||
|
return 0;
|
||
|
case MAE_FIELD_SUPPORTED_MATCH_MASK:
|
||
|
return 0;
|
||
|
default:
|
||
|
return -EIO;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* Validate field mask against hardware capabilities. Captures caller's 'rc' */
|
||
|
#define CHECK(_mcdi, _field) ({ \
|
||
|
enum mask_type typ = classify_mask((const u8 *)&mask->_field, \
|
||
|
sizeof(mask->_field)); \
|
||
|
\
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ ## _mcdi],\
|
||
|
typ); \
|
||
|
if (rc) \
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, \
|
||
|
"No support for %s mask in field %s", \
|
||
|
mask_type_name(typ), #_field); \
|
||
|
rc; \
|
||
|
})
|
||
|
/* Booleans need special handling */
|
||
|
#define CHECK_BIT(_mcdi, _field) ({ \
|
||
|
enum mask_type typ = mask->_field ? MASK_ONES : MASK_ZEROES; \
|
||
|
\
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ ## _mcdi],\
|
||
|
typ); \
|
||
|
if (rc) \
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, \
|
||
|
"No support for %s mask in field %s", \
|
||
|
mask_type_name(typ), #_field); \
|
||
|
rc; \
|
||
|
})
|
||
|
|
||
|
int efx_mae_match_check_caps(struct efx_nic *efx,
|
||
|
const struct efx_tc_match_fields *mask,
|
||
|
struct netlink_ext_ack *extack)
|
||
|
{
|
||
|
const u8 *supported_fields = efx->tc->caps->action_rule_fields;
|
||
|
__be32 ingress_port = cpu_to_be32(mask->ingress_port);
|
||
|
enum mask_type ingress_port_mask_type;
|
||
|
int rc;
|
||
|
|
||
|
/* Check for _PREFIX assumes big-endian, so we need to convert */
|
||
|
ingress_port_mask_type = classify_mask((const u8 *)&ingress_port,
|
||
|
sizeof(ingress_port));
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_INGRESS_PORT],
|
||
|
ingress_port_mask_type);
|
||
|
if (rc) {
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field ingress_port",
|
||
|
mask_type_name(ingress_port_mask_type));
|
||
|
return rc;
|
||
|
}
|
||
|
if (CHECK(ETHER_TYPE, eth_proto) ||
|
||
|
CHECK(VLAN0_TCI, vlan_tci[0]) ||
|
||
|
CHECK(VLAN0_PROTO, vlan_proto[0]) ||
|
||
|
CHECK(VLAN1_TCI, vlan_tci[1]) ||
|
||
|
CHECK(VLAN1_PROTO, vlan_proto[1]) ||
|
||
|
CHECK(ETH_SADDR, eth_saddr) ||
|
||
|
CHECK(ETH_DADDR, eth_daddr) ||
|
||
|
CHECK(IP_PROTO, ip_proto) ||
|
||
|
CHECK(IP_TOS, ip_tos) ||
|
||
|
CHECK(IP_TTL, ip_ttl) ||
|
||
|
CHECK(SRC_IP4, src_ip) ||
|
||
|
CHECK(DST_IP4, dst_ip) ||
|
||
|
#ifdef CONFIG_IPV6
|
||
|
CHECK(SRC_IP6, src_ip6) ||
|
||
|
CHECK(DST_IP6, dst_ip6) ||
|
||
|
#endif
|
||
|
CHECK(L4_SPORT, l4_sport) ||
|
||
|
CHECK(L4_DPORT, l4_dport) ||
|
||
|
CHECK(TCP_FLAGS, tcp_flags) ||
|
||
|
CHECK_BIT(TCP_SYN_FIN_RST, tcp_syn_fin_rst) ||
|
||
|
CHECK_BIT(IS_IP_FRAG, ip_frag) ||
|
||
|
CHECK_BIT(IP_FIRST_FRAG, ip_firstfrag) ||
|
||
|
CHECK_BIT(DO_CT, ct_state_trk) ||
|
||
|
CHECK_BIT(CT_HIT, ct_state_est) ||
|
||
|
CHECK(CT_MARK, ct_mark) ||
|
||
|
CHECK(CT_DOMAIN, ct_zone) ||
|
||
|
CHECK(RECIRC_ID, recirc_id))
|
||
|
return rc;
|
||
|
/* Matches on outer fields are done in a separate hardware table,
|
||
|
* the Outer Rule table. Thus the Action Rule merely does an
|
||
|
* exact match on Outer Rule ID if any outer field matches are
|
||
|
* present. The exception is the VNI/VSID (enc_keyid), which is
|
||
|
* available to the Action Rule match iff the Outer Rule matched
|
||
|
* (and thus identified the encap protocol to use to extract it).
|
||
|
*/
|
||
|
if (efx_tc_match_is_encap(mask)) {
|
||
|
rc = efx_mae_match_check_cap_typ(
|
||
|
supported_fields[MAE_FIELD_OUTER_RULE_ID],
|
||
|
MASK_ONES);
|
||
|
if (rc) {
|
||
|
NL_SET_ERR_MSG_MOD(extack, "No support for encap rule ID matches");
|
||
|
return rc;
|
||
|
}
|
||
|
if (CHECK(ENC_VNET_ID, enc_keyid))
|
||
|
return rc;
|
||
|
} else if (mask->enc_keyid) {
|
||
|
NL_SET_ERR_MSG_MOD(extack, "Match on enc_keyid requires other encap fields");
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
/* Checks for match fields not supported in LHS Outer Rules */
|
||
|
#define UNSUPPORTED(_field) ({ \
|
||
|
enum mask_type typ = classify_mask((const u8 *)&mask->_field, \
|
||
|
sizeof(mask->_field)); \
|
||
|
\
|
||
|
if (typ != MASK_ZEROES) { \
|
||
|
NL_SET_ERR_MSG_MOD(extack, "Unsupported match field " #_field);\
|
||
|
rc = -EOPNOTSUPP; \
|
||
|
} \
|
||
|
rc; \
|
||
|
})
|
||
|
#define UNSUPPORTED_BIT(_field) ({ \
|
||
|
if (mask->_field) { \
|
||
|
NL_SET_ERR_MSG_MOD(extack, "Unsupported match field " #_field);\
|
||
|
rc = -EOPNOTSUPP; \
|
||
|
} \
|
||
|
rc; \
|
||
|
})
|
||
|
|
||
|
/* LHS rules are (normally) inserted in the Outer Rule table, which means
|
||
|
* they use ENC_ fields in hardware to match regular (not enc_) fields from
|
||
|
* &struct efx_tc_match_fields.
|
||
|
*/
|
||
|
int efx_mae_match_check_caps_lhs(struct efx_nic *efx,
|
||
|
const struct efx_tc_match_fields *mask,
|
||
|
struct netlink_ext_ack *extack)
|
||
|
{
|
||
|
const u8 *supported_fields = efx->tc->caps->outer_rule_fields;
|
||
|
__be32 ingress_port = cpu_to_be32(mask->ingress_port);
|
||
|
enum mask_type ingress_port_mask_type;
|
||
|
int rc;
|
||
|
|
||
|
/* Check for _PREFIX assumes big-endian, so we need to convert */
|
||
|
ingress_port_mask_type = classify_mask((const u8 *)&ingress_port,
|
||
|
sizeof(ingress_port));
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_INGRESS_PORT],
|
||
|
ingress_port_mask_type);
|
||
|
if (rc) {
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field %s\n",
|
||
|
mask_type_name(ingress_port_mask_type),
|
||
|
"ingress_port");
|
||
|
return rc;
|
||
|
}
|
||
|
if (CHECK(ENC_ETHER_TYPE, eth_proto) ||
|
||
|
CHECK(ENC_VLAN0_TCI, vlan_tci[0]) ||
|
||
|
CHECK(ENC_VLAN0_PROTO, vlan_proto[0]) ||
|
||
|
CHECK(ENC_VLAN1_TCI, vlan_tci[1]) ||
|
||
|
CHECK(ENC_VLAN1_PROTO, vlan_proto[1]) ||
|
||
|
CHECK(ENC_ETH_SADDR, eth_saddr) ||
|
||
|
CHECK(ENC_ETH_DADDR, eth_daddr) ||
|
||
|
CHECK(ENC_IP_PROTO, ip_proto) ||
|
||
|
CHECK(ENC_IP_TOS, ip_tos) ||
|
||
|
CHECK(ENC_IP_TTL, ip_ttl) ||
|
||
|
CHECK_BIT(ENC_IP_FRAG, ip_frag) ||
|
||
|
UNSUPPORTED_BIT(ip_firstfrag) ||
|
||
|
CHECK(ENC_SRC_IP4, src_ip) ||
|
||
|
CHECK(ENC_DST_IP4, dst_ip) ||
|
||
|
#ifdef CONFIG_IPV6
|
||
|
CHECK(ENC_SRC_IP6, src_ip6) ||
|
||
|
CHECK(ENC_DST_IP6, dst_ip6) ||
|
||
|
#endif
|
||
|
CHECK(ENC_L4_SPORT, l4_sport) ||
|
||
|
CHECK(ENC_L4_DPORT, l4_dport) ||
|
||
|
UNSUPPORTED(tcp_flags) ||
|
||
|
CHECK_BIT(TCP_SYN_FIN_RST, tcp_syn_fin_rst))
|
||
|
return rc;
|
||
|
if (efx_tc_match_is_encap(mask)) {
|
||
|
/* can't happen; disallowed for local rules, translated
|
||
|
* for foreign rules.
|
||
|
*/
|
||
|
NL_SET_ERR_MSG_MOD(extack, "Unexpected encap match in LHS rule");
|
||
|
return -EOPNOTSUPP;
|
||
|
}
|
||
|
if (UNSUPPORTED(enc_keyid) ||
|
||
|
/* Can't filter on conntrack in LHS rules */
|
||
|
UNSUPPORTED_BIT(ct_state_trk) ||
|
||
|
UNSUPPORTED_BIT(ct_state_est) ||
|
||
|
UNSUPPORTED(ct_mark) ||
|
||
|
UNSUPPORTED(recirc_id))
|
||
|
return rc;
|
||
|
return 0;
|
||
|
}
|
||
|
#undef UNSUPPORTED
|
||
|
#undef CHECK_BIT
|
||
|
#undef CHECK
|
||
|
|
||
|
#define CHECK(_mcdi) ({ \
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ ## _mcdi],\
|
||
|
MASK_ONES); \
|
||
|
if (rc) \
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, \
|
||
|
"No support for field %s", #_mcdi); \
|
||
|
rc; \
|
||
|
})
|
||
|
/* Checks that the fields needed for encap-rule matches are supported by the
|
||
|
* MAE. All the fields are exact-match, except possibly ENC_IP_TOS.
|
||
|
*/
|
||
|
int efx_mae_check_encap_match_caps(struct efx_nic *efx, bool ipv6,
|
||
|
u8 ip_tos_mask, __be16 udp_sport_mask,
|
||
|
struct netlink_ext_ack *extack)
|
||
|
{
|
||
|
u8 *supported_fields = efx->tc->caps->outer_rule_fields;
|
||
|
enum mask_type typ;
|
||
|
int rc;
|
||
|
|
||
|
if (CHECK(ENC_ETHER_TYPE))
|
||
|
return rc;
|
||
|
if (ipv6) {
|
||
|
if (CHECK(ENC_SRC_IP6) ||
|
||
|
CHECK(ENC_DST_IP6))
|
||
|
return rc;
|
||
|
} else {
|
||
|
if (CHECK(ENC_SRC_IP4) ||
|
||
|
CHECK(ENC_DST_IP4))
|
||
|
return rc;
|
||
|
}
|
||
|
if (CHECK(ENC_L4_DPORT) ||
|
||
|
CHECK(ENC_IP_PROTO))
|
||
|
return rc;
|
||
|
typ = classify_mask((const u8 *)&udp_sport_mask, sizeof(udp_sport_mask));
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ENC_L4_SPORT],
|
||
|
typ);
|
||
|
if (rc) {
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field %s",
|
||
|
mask_type_name(typ), "enc_src_port");
|
||
|
return rc;
|
||
|
}
|
||
|
typ = classify_mask(&ip_tos_mask, sizeof(ip_tos_mask));
|
||
|
rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ENC_IP_TOS],
|
||
|
typ);
|
||
|
if (rc) {
|
||
|
NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field %s",
|
||
|
mask_type_name(typ), "enc_ip_tos");
|
||
|
return rc;
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
#undef CHECK
|
||
|
|
||
|
int efx_mae_check_encap_type_supported(struct efx_nic *efx, enum efx_encap_type typ)
|
||
|
{
|
||
|
unsigned int bit;
|
||
|
|
||
|
switch (typ & EFX_ENCAP_TYPES_MASK) {
|
||
|
case EFX_ENCAP_TYPE_VXLAN:
|
||
|
bit = MC_CMD_MAE_GET_CAPS_OUT_ENCAP_TYPE_VXLAN_LBN;
|
||
|
break;
|
||
|
case EFX_ENCAP_TYPE_GENEVE:
|
||
|
bit = MC_CMD_MAE_GET_CAPS_OUT_ENCAP_TYPE_GENEVE_LBN;
|
||
|
break;
|
||
|
default:
|
||
|
return -EOPNOTSUPP;
|
||
|
}
|
||
|
if (efx->tc->caps->encap_types & BIT(bit))
|
||
|
return 0;
|
||
|
return -EOPNOTSUPP;
|
||
|
}
|
||
|
|
||
|
int efx_mae_allocate_counter(struct efx_nic *efx, struct efx_tc_counter *cnt)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTER_ALLOC_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTER_ALLOC_V2_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
if (!cnt)
|
||
|
return -EINVAL;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTER_ALLOC_V2_IN_REQUESTED_COUNT, 1);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTER_ALLOC_V2_IN_COUNTER_TYPE, cnt->type);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTER_ALLOC, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
/* pcol says this can't happen, since count is 1 */
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
cnt->fw_id = MCDI_DWORD(outbuf, MAE_COUNTER_ALLOC_OUT_COUNTER_ID);
|
||
|
cnt->gen = MCDI_DWORD(outbuf, MAE_COUNTER_ALLOC_OUT_GENERATION_COUNT);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_free_counter(struct efx_nic *efx, struct efx_tc_counter *cnt)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTER_FREE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTER_FREE_V2_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTER_FREE_V2_IN_COUNTER_ID_COUNT, 1);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTER_FREE_V2_IN_FREE_COUNTER_ID, cnt->fw_id);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_COUNTER_FREE_V2_IN_COUNTER_TYPE, cnt->type);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTER_FREE, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
/* pcol says this can't happen, since count is 1 */
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should also never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what counters exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_COUNTER_FREE_OUT_FREED_COUNTER_ID) !=
|
||
|
cnt->fw_id))
|
||
|
return -EIO;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_encap_type_to_mae_type(enum efx_encap_type type)
|
||
|
{
|
||
|
switch (type & EFX_ENCAP_TYPES_MASK) {
|
||
|
case EFX_ENCAP_TYPE_NONE:
|
||
|
return MAE_MCDI_ENCAP_TYPE_NONE;
|
||
|
case EFX_ENCAP_TYPE_VXLAN:
|
||
|
return MAE_MCDI_ENCAP_TYPE_VXLAN;
|
||
|
case EFX_ENCAP_TYPE_GENEVE:
|
||
|
return MAE_MCDI_ENCAP_TYPE_GENEVE;
|
||
|
default:
|
||
|
return -EOPNOTSUPP;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
int efx_mae_allocate_encap_md(struct efx_nic *efx,
|
||
|
struct efx_tc_encap_action *encap)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ENCAP_HEADER_ALLOC_IN_LEN(EFX_TC_MAX_ENCAP_HDR));
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ENCAP_HEADER_ALLOC_OUT_LEN);
|
||
|
size_t inlen, outlen;
|
||
|
int rc;
|
||
|
|
||
|
rc = efx_mae_encap_type_to_mae_type(encap->type);
|
||
|
if (rc < 0)
|
||
|
return rc;
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_ALLOC_IN_ENCAP_TYPE, rc);
|
||
|
inlen = MC_CMD_MAE_ENCAP_HEADER_ALLOC_IN_LEN(encap->encap_hdr_len);
|
||
|
if (WARN_ON(inlen > sizeof(inbuf))) /* can't happen */
|
||
|
return -EINVAL;
|
||
|
memcpy(MCDI_PTR(inbuf, MAE_ENCAP_HEADER_ALLOC_IN_HDR_DATA),
|
||
|
encap->encap_hdr,
|
||
|
encap->encap_hdr_len);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ENCAP_HEADER_ALLOC, inbuf,
|
||
|
inlen, outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
encap->fw_id = MCDI_DWORD(outbuf, MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_update_encap_md(struct efx_nic *efx,
|
||
|
struct efx_tc_encap_action *encap)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ENCAP_HEADER_UPDATE_IN_LEN(EFX_TC_MAX_ENCAP_HDR));
|
||
|
size_t inlen;
|
||
|
int rc;
|
||
|
|
||
|
rc = efx_mae_encap_type_to_mae_type(encap->type);
|
||
|
if (rc < 0)
|
||
|
return rc;
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_UPDATE_IN_ENCAP_TYPE, rc);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_UPDATE_IN_EH_ID,
|
||
|
encap->fw_id);
|
||
|
inlen = MC_CMD_MAE_ENCAP_HEADER_UPDATE_IN_LEN(encap->encap_hdr_len);
|
||
|
if (WARN_ON(inlen > sizeof(inbuf))) /* can't happen */
|
||
|
return -EINVAL;
|
||
|
memcpy(MCDI_PTR(inbuf, MAE_ENCAP_HEADER_UPDATE_IN_HDR_DATA),
|
||
|
encap->encap_hdr,
|
||
|
encap->encap_hdr_len);
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_ENCAP_HEADER_UPDATE_OUT_LEN != 0);
|
||
|
return efx_mcdi_rpc(efx, MC_CMD_MAE_ENCAP_HEADER_UPDATE, inbuf,
|
||
|
inlen, NULL, 0, NULL);
|
||
|
}
|
||
|
|
||
|
int efx_mae_free_encap_md(struct efx_nic *efx,
|
||
|
struct efx_tc_encap_action *encap)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ENCAP_HEADER_FREE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ENCAP_HEADER_FREE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_FREE_IN_EH_ID, encap->fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ENCAP_HEADER_FREE, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should also never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what encap_mds exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_ENCAP_HEADER_FREE_OUT_FREED_EH_ID) != encap->fw_id))
|
||
|
return -EIO;
|
||
|
/* We're probably about to free @encap, but let's just make sure its
|
||
|
* fw_id is blatted so that it won't look valid if it leaks out.
|
||
|
*/
|
||
|
encap->fw_id = MC_CMD_MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID_NULL;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_lookup_mport(struct efx_nic *efx, u32 vf_idx, u32 *id)
|
||
|
{
|
||
|
struct ef100_nic_data *nic_data = efx->nic_data;
|
||
|
struct efx_mae *mae = efx->mae;
|
||
|
struct rhashtable_iter walk;
|
||
|
struct mae_mport_desc *m;
|
||
|
int rc = -ENOENT;
|
||
|
|
||
|
rhashtable_walk_enter(&mae->mports_ht, &walk);
|
||
|
rhashtable_walk_start(&walk);
|
||
|
while ((m = rhashtable_walk_next(&walk)) != NULL) {
|
||
|
if (m->mport_type == MAE_MPORT_DESC_MPORT_TYPE_VNIC &&
|
||
|
m->interface_idx == nic_data->local_mae_intf &&
|
||
|
m->pf_idx == 0 &&
|
||
|
m->vf_idx == vf_idx) {
|
||
|
*id = m->mport_id;
|
||
|
rc = 0;
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
rhashtable_walk_stop(&walk);
|
||
|
rhashtable_walk_exit(&walk);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
static bool efx_mae_asl_id(u32 id)
|
||
|
{
|
||
|
return !!(id & BIT(31));
|
||
|
}
|
||
|
|
||
|
/* mport handling */
|
||
|
static const struct rhashtable_params efx_mae_mports_ht_params = {
|
||
|
.key_len = sizeof(u32),
|
||
|
.key_offset = offsetof(struct mae_mport_desc, mport_id),
|
||
|
.head_offset = offsetof(struct mae_mport_desc, linkage),
|
||
|
};
|
||
|
|
||
|
struct mae_mport_desc *efx_mae_get_mport(struct efx_nic *efx, u32 mport_id)
|
||
|
{
|
||
|
return rhashtable_lookup_fast(&efx->mae->mports_ht, &mport_id,
|
||
|
efx_mae_mports_ht_params);
|
||
|
}
|
||
|
|
||
|
static int efx_mae_add_mport(struct efx_nic *efx, struct mae_mport_desc *desc)
|
||
|
{
|
||
|
struct efx_mae *mae = efx->mae;
|
||
|
int rc;
|
||
|
|
||
|
rc = rhashtable_insert_fast(&mae->mports_ht, &desc->linkage,
|
||
|
efx_mae_mports_ht_params);
|
||
|
|
||
|
if (rc) {
|
||
|
pci_err(efx->pci_dev, "Failed to insert MPORT %08x, rc %d\n",
|
||
|
desc->mport_id, rc);
|
||
|
kfree(desc);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
void efx_mae_remove_mport(void *desc, void *arg)
|
||
|
{
|
||
|
struct mae_mport_desc *mport = desc;
|
||
|
|
||
|
synchronize_rcu();
|
||
|
kfree(mport);
|
||
|
}
|
||
|
|
||
|
static int efx_mae_process_mport(struct efx_nic *efx,
|
||
|
struct mae_mport_desc *desc)
|
||
|
{
|
||
|
struct ef100_nic_data *nic_data = efx->nic_data;
|
||
|
struct mae_mport_desc *mport;
|
||
|
|
||
|
mport = efx_mae_get_mport(efx, desc->mport_id);
|
||
|
if (!IS_ERR_OR_NULL(mport)) {
|
||
|
netif_err(efx, drv, efx->net_dev,
|
||
|
"mport with id %u does exist!!!\n", desc->mport_id);
|
||
|
return -EEXIST;
|
||
|
}
|
||
|
|
||
|
if (nic_data->have_own_mport &&
|
||
|
desc->mport_id == nic_data->own_mport) {
|
||
|
WARN_ON(desc->mport_type != MAE_MPORT_DESC_MPORT_TYPE_VNIC);
|
||
|
WARN_ON(desc->vnic_client_type !=
|
||
|
MAE_MPORT_DESC_VNIC_CLIENT_TYPE_FUNCTION);
|
||
|
nic_data->local_mae_intf = desc->interface_idx;
|
||
|
nic_data->have_local_intf = true;
|
||
|
pci_dbg(efx->pci_dev, "MAE interface_idx is %u\n",
|
||
|
nic_data->local_mae_intf);
|
||
|
}
|
||
|
|
||
|
return efx_mae_add_mport(efx, desc);
|
||
|
}
|
||
|
|
||
|
#define MCDI_MPORT_JOURNAL_LEN \
|
||
|
ALIGN(MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_LENMAX_MCDI2, 4)
|
||
|
|
||
|
int efx_mae_enumerate_mports(struct efx_nic *efx)
|
||
|
{
|
||
|
efx_dword_t *outbuf = kzalloc(MCDI_MPORT_JOURNAL_LEN, GFP_KERNEL);
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_READ_JOURNAL_IN_LEN);
|
||
|
MCDI_DECLARE_STRUCT_PTR(desc);
|
||
|
size_t outlen, stride, count;
|
||
|
int rc = 0, i;
|
||
|
|
||
|
if (!outbuf)
|
||
|
return -ENOMEM;
|
||
|
do {
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_READ_JOURNAL, inbuf,
|
||
|
sizeof(inbuf), outbuf,
|
||
|
MCDI_MPORT_JOURNAL_LEN, &outlen);
|
||
|
if (rc)
|
||
|
goto fail;
|
||
|
if (outlen < MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_MPORT_DESC_DATA_OFST) {
|
||
|
rc = -EIO;
|
||
|
goto fail;
|
||
|
}
|
||
|
count = MCDI_DWORD(outbuf, MAE_MPORT_READ_JOURNAL_OUT_MPORT_DESC_COUNT);
|
||
|
if (!count)
|
||
|
continue; /* not break; we want to look at MORE flag */
|
||
|
stride = MCDI_DWORD(outbuf, MAE_MPORT_READ_JOURNAL_OUT_SIZEOF_MPORT_DESC);
|
||
|
if (stride < MAE_MPORT_DESC_LEN) {
|
||
|
rc = -EIO;
|
||
|
goto fail;
|
||
|
}
|
||
|
if (outlen < MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_LEN(count * stride)) {
|
||
|
rc = -EIO;
|
||
|
goto fail;
|
||
|
}
|
||
|
|
||
|
for (i = 0; i < count; i++) {
|
||
|
struct mae_mport_desc *d;
|
||
|
|
||
|
d = kzalloc(sizeof(*d), GFP_KERNEL);
|
||
|
if (!d) {
|
||
|
rc = -ENOMEM;
|
||
|
goto fail;
|
||
|
}
|
||
|
|
||
|
desc = (efx_dword_t *)
|
||
|
_MCDI_PTR(outbuf, MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_MPORT_DESC_DATA_OFST +
|
||
|
i * stride);
|
||
|
d->mport_id = MCDI_STRUCT_DWORD(desc, MAE_MPORT_DESC_MPORT_ID);
|
||
|
d->flags = MCDI_STRUCT_DWORD(desc, MAE_MPORT_DESC_FLAGS);
|
||
|
d->caller_flags = MCDI_STRUCT_DWORD(desc,
|
||
|
MAE_MPORT_DESC_CALLER_FLAGS);
|
||
|
d->mport_type = MCDI_STRUCT_DWORD(desc,
|
||
|
MAE_MPORT_DESC_MPORT_TYPE);
|
||
|
switch (d->mport_type) {
|
||
|
case MAE_MPORT_DESC_MPORT_TYPE_NET_PORT:
|
||
|
d->port_idx = MCDI_STRUCT_DWORD(desc,
|
||
|
MAE_MPORT_DESC_NET_PORT_IDX);
|
||
|
break;
|
||
|
case MAE_MPORT_DESC_MPORT_TYPE_ALIAS:
|
||
|
d->alias_mport_id = MCDI_STRUCT_DWORD(desc,
|
||
|
MAE_MPORT_DESC_ALIAS_DELIVER_MPORT_ID);
|
||
|
break;
|
||
|
case MAE_MPORT_DESC_MPORT_TYPE_VNIC:
|
||
|
d->vnic_client_type = MCDI_STRUCT_DWORD(desc,
|
||
|
MAE_MPORT_DESC_VNIC_CLIENT_TYPE);
|
||
|
d->interface_idx = MCDI_STRUCT_DWORD(desc,
|
||
|
MAE_MPORT_DESC_VNIC_FUNCTION_INTERFACE);
|
||
|
d->pf_idx = MCDI_STRUCT_WORD(desc,
|
||
|
MAE_MPORT_DESC_VNIC_FUNCTION_PF_IDX);
|
||
|
d->vf_idx = MCDI_STRUCT_WORD(desc,
|
||
|
MAE_MPORT_DESC_VNIC_FUNCTION_VF_IDX);
|
||
|
break;
|
||
|
default:
|
||
|
/* Unknown mport_type, just accept it */
|
||
|
break;
|
||
|
}
|
||
|
rc = efx_mae_process_mport(efx, d);
|
||
|
/* Any failure will be due to memory allocation faiure,
|
||
|
* so there is no point to try subsequent entries.
|
||
|
*/
|
||
|
if (rc)
|
||
|
goto fail;
|
||
|
}
|
||
|
} while (MCDI_FIELD(outbuf, MAE_MPORT_READ_JOURNAL_OUT, MORE) &&
|
||
|
!WARN_ON(!count));
|
||
|
fail:
|
||
|
kfree(outbuf);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* efx_mae_allocate_pedit_mac() - allocate pedit MAC address in HW.
|
||
|
* @efx: NIC we're installing a pedit MAC address on
|
||
|
* @ped: pedit MAC action to be installed
|
||
|
*
|
||
|
* Attempts to install @ped in HW and populates its id with an index of this
|
||
|
* entry in the firmware MAC address table on success.
|
||
|
*
|
||
|
* Return: negative value on error, 0 in success.
|
||
|
*/
|
||
|
int efx_mae_allocate_pedit_mac(struct efx_nic *efx,
|
||
|
struct efx_tc_mac_pedit_action *ped)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_LEN);
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MAC_ADDR_ALLOC_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_MAC_ADDR_ALLOC_IN_MAC_ADDR_LEN !=
|
||
|
sizeof(ped->h_addr));
|
||
|
memcpy(MCDI_PTR(inbuf, MAE_MAC_ADDR_ALLOC_IN_MAC_ADDR), ped->h_addr,
|
||
|
sizeof(ped->h_addr));
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MAC_ADDR_ALLOC, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
ped->fw_id = MCDI_DWORD(outbuf, MAE_MAC_ADDR_ALLOC_OUT_MAC_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
/**
|
||
|
* efx_mae_free_pedit_mac() - free pedit MAC address in HW.
|
||
|
* @efx: NIC we're installing a pedit MAC address on
|
||
|
* @ped: pedit MAC action that needs to be freed
|
||
|
*
|
||
|
* Frees @ped in HW, check that firmware did not free a different one and clears
|
||
|
* the id (which denotes the index of the entry in the MAC address table).
|
||
|
*/
|
||
|
void efx_mae_free_pedit_mac(struct efx_nic *efx,
|
||
|
struct efx_tc_mac_pedit_action *ped)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MAC_ADDR_FREE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MAC_ADDR_FREE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_MAC_ADDR_FREE_IN_MAC_ID, ped->fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MAC_ADDR_FREE, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc || outlen < sizeof(outbuf))
|
||
|
return;
|
||
|
/* FW freed a different ID than we asked for, should also never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what MAC addresses exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_MAC_ADDR_FREE_OUT_FREED_MAC_ID) != ped->fw_id))
|
||
|
return;
|
||
|
/* We're probably about to free @ped, but let's just make sure its
|
||
|
* fw_id is blatted so that it won't look valid if it leaks out.
|
||
|
*/
|
||
|
ped->fw_id = MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_MAC_ID_NULL;
|
||
|
}
|
||
|
|
||
|
int efx_mae_alloc_action_set(struct efx_nic *efx, struct efx_tc_action_set *act)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_ALLOC_OUT_LEN);
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_SET_ALLOC_IN_LEN);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_POPULATE_DWORD_5(inbuf, MAE_ACTION_SET_ALLOC_IN_FLAGS,
|
||
|
MAE_ACTION_SET_ALLOC_IN_VLAN_PUSH, act->vlan_push,
|
||
|
MAE_ACTION_SET_ALLOC_IN_VLAN_POP, act->vlan_pop,
|
||
|
MAE_ACTION_SET_ALLOC_IN_DECAP, act->decap,
|
||
|
MAE_ACTION_SET_ALLOC_IN_DO_NAT, act->do_nat,
|
||
|
MAE_ACTION_SET_ALLOC_IN_DO_DECR_IP_TTL,
|
||
|
act->do_ttl_dec);
|
||
|
|
||
|
if (act->src_mac)
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_SRC_MAC_ID,
|
||
|
act->src_mac->fw_id);
|
||
|
else
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_SRC_MAC_ID,
|
||
|
MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_MAC_ID_NULL);
|
||
|
|
||
|
if (act->dst_mac)
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_DST_MAC_ID,
|
||
|
act->dst_mac->fw_id);
|
||
|
else
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_DST_MAC_ID,
|
||
|
MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_MAC_ID_NULL);
|
||
|
|
||
|
if (act->count && !WARN_ON(!act->count->cnt))
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_COUNTER_ID,
|
||
|
act->count->cnt->fw_id);
|
||
|
else
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_COUNTER_ID,
|
||
|
MC_CMD_MAE_COUNTER_ALLOC_OUT_COUNTER_ID_NULL);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_COUNTER_LIST_ID,
|
||
|
MC_CMD_MAE_COUNTER_LIST_ALLOC_OUT_COUNTER_LIST_ID_NULL);
|
||
|
if (act->vlan_push) {
|
||
|
MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN0_TCI_BE,
|
||
|
act->vlan_tci[0]);
|
||
|
MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN0_PROTO_BE,
|
||
|
act->vlan_proto[0]);
|
||
|
}
|
||
|
if (act->vlan_push >= 2) {
|
||
|
MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN1_TCI_BE,
|
||
|
act->vlan_tci[1]);
|
||
|
MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN1_PROTO_BE,
|
||
|
act->vlan_proto[1]);
|
||
|
}
|
||
|
if (act->encap_md)
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_ENCAP_HEADER_ID,
|
||
|
act->encap_md->fw_id);
|
||
|
else
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_ENCAP_HEADER_ID,
|
||
|
MC_CMD_MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID_NULL);
|
||
|
if (act->deliver)
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_DELIVER,
|
||
|
act->dest_mport);
|
||
|
BUILD_BUG_ON(MAE_MPORT_SELECTOR_NULL);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_ALLOC, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
act->fw_id = MCDI_DWORD(outbuf, MAE_ACTION_SET_ALLOC_OUT_AS_ID);
|
||
|
/* We rely on the high bit of AS IDs always being clear.
|
||
|
* The firmware API guarantees this, but let's check it ourselves.
|
||
|
*/
|
||
|
if (WARN_ON_ONCE(efx_mae_asl_id(act->fw_id))) {
|
||
|
efx_mae_free_action_set(efx, act->fw_id);
|
||
|
return -EIO;
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_free_action_set(struct efx_nic *efx, u32 fw_id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_FREE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_SET_FREE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_FREE_IN_AS_ID, fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_FREE, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what action-sets exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_ACTION_SET_FREE_OUT_FREED_AS_ID) != fw_id))
|
||
|
return -EIO;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_alloc_action_set_list(struct efx_nic *efx,
|
||
|
struct efx_tc_action_set_list *acts)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_LEN);
|
||
|
struct efx_tc_action_set *act;
|
||
|
size_t inlen, outlen, i = 0;
|
||
|
efx_dword_t *inbuf;
|
||
|
int rc;
|
||
|
|
||
|
list_for_each_entry(act, &acts->list, list)
|
||
|
i++;
|
||
|
if (i == 0)
|
||
|
return -EINVAL;
|
||
|
if (i == 1) {
|
||
|
/* Don't wrap an ASL around a single AS, just use the AS_ID
|
||
|
* directly. ASLs are a more limited resource.
|
||
|
*/
|
||
|
act = list_first_entry(&acts->list, struct efx_tc_action_set, list);
|
||
|
acts->fw_id = act->fw_id;
|
||
|
return 0;
|
||
|
}
|
||
|
if (i > MC_CMD_MAE_ACTION_SET_LIST_ALLOC_IN_AS_IDS_MAXNUM_MCDI2)
|
||
|
return -EOPNOTSUPP; /* Too many actions */
|
||
|
inlen = MC_CMD_MAE_ACTION_SET_LIST_ALLOC_IN_LEN(i);
|
||
|
inbuf = kzalloc(inlen, GFP_KERNEL);
|
||
|
if (!inbuf)
|
||
|
return -ENOMEM;
|
||
|
i = 0;
|
||
|
list_for_each_entry(act, &acts->list, list) {
|
||
|
MCDI_SET_ARRAY_DWORD(inbuf, MAE_ACTION_SET_LIST_ALLOC_IN_AS_IDS,
|
||
|
i, act->fw_id);
|
||
|
i++;
|
||
|
}
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_LIST_ALLOC_IN_COUNT, i);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_LIST_ALLOC, inbuf, inlen,
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
if (outlen < sizeof(outbuf)) {
|
||
|
rc = -EIO;
|
||
|
goto out_free;
|
||
|
}
|
||
|
acts->fw_id = MCDI_DWORD(outbuf, MAE_ACTION_SET_LIST_ALLOC_OUT_ASL_ID);
|
||
|
/* We rely on the high bit of ASL IDs always being set.
|
||
|
* The firmware API guarantees this, but let's check it ourselves.
|
||
|
*/
|
||
|
if (WARN_ON_ONCE(!efx_mae_asl_id(acts->fw_id))) {
|
||
|
efx_mae_free_action_set_list(efx, acts);
|
||
|
rc = -EIO;
|
||
|
}
|
||
|
out_free:
|
||
|
kfree(inbuf);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
int efx_mae_free_action_set_list(struct efx_nic *efx,
|
||
|
struct efx_tc_action_set_list *acts)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_LIST_FREE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_SET_LIST_FREE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
/* If this is just an AS_ID with no ASL wrapper, then there is
|
||
|
* nothing for us to free. (The AS will be freed later.)
|
||
|
*/
|
||
|
if (efx_mae_asl_id(acts->fw_id)) {
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_LIST_FREE_IN_ASL_ID,
|
||
|
acts->fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_LIST_FREE, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what action-set-lists exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_ACTION_SET_LIST_FREE_OUT_FREED_ASL_ID) != acts->fw_id))
|
||
|
return -EIO;
|
||
|
}
|
||
|
/* We're probably about to free @acts, but let's just make sure its
|
||
|
* fw_id is blatted so that it won't look valid if it leaks out.
|
||
|
*/
|
||
|
acts->fw_id = MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_register_encap_match(struct efx_nic *efx,
|
||
|
struct efx_tc_encap_match *encap)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_INSERT_IN_LEN(MAE_ENC_FIELD_PAIRS_LEN));
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_INSERT_OUT_LEN);
|
||
|
MCDI_DECLARE_STRUCT_PTR(match_crit);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
rc = efx_mae_encap_type_to_mae_type(encap->tun_type);
|
||
|
if (rc < 0)
|
||
|
return rc;
|
||
|
match_crit = _MCDI_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_FIELD_MATCH_CRITERIA);
|
||
|
/* The struct contains IP src and dst, and udp dport.
|
||
|
* So we actually need to filter on IP src and dst, L4 dport, and
|
||
|
* ipproto == udp.
|
||
|
*/
|
||
|
MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_ENCAP_TYPE, rc);
|
||
|
#ifdef CONFIG_IPV6
|
||
|
if (encap->src_ip | encap->dst_ip) {
|
||
|
#endif
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE,
|
||
|
encap->src_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE_MASK,
|
||
|
~(__be32)0);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE,
|
||
|
encap->dst_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE_MASK,
|
||
|
~(__be32)0);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE,
|
||
|
htons(ETH_P_IP));
|
||
|
#ifdef CONFIG_IPV6
|
||
|
} else {
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE),
|
||
|
&encap->src_ip6, sizeof(encap->src_ip6));
|
||
|
memset(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE_MASK),
|
||
|
0xff, sizeof(encap->src_ip6));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE),
|
||
|
&encap->dst_ip6, sizeof(encap->dst_ip6));
|
||
|
memset(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE_MASK),
|
||
|
0xff, sizeof(encap->dst_ip6));
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE,
|
||
|
htons(ETH_P_IPV6));
|
||
|
}
|
||
|
#endif
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE_MASK,
|
||
|
~(__be16)0);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE,
|
||
|
encap->udp_dport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE_MASK,
|
||
|
~(__be16)0);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE,
|
||
|
encap->udp_sport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE_MASK,
|
||
|
encap->udp_sport_mask);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO, IPPROTO_UDP);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO_MASK, ~0);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS,
|
||
|
encap->ip_tos);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS_MASK,
|
||
|
encap->ip_tos_mask);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_INSERT, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
encap->fw_id = MCDI_DWORD(outbuf, MAE_OUTER_RULE_INSERT_OUT_OR_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_unregister_encap_match(struct efx_nic *efx,
|
||
|
struct efx_tc_encap_match *encap)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_REMOVE_IN_OR_ID, encap->fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_REMOVE, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should also never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what encap_mds exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_OUTER_RULE_REMOVE_OUT_REMOVED_OR_ID) != encap->fw_id))
|
||
|
return -EIO;
|
||
|
/* We're probably about to free @encap, but let's just make sure its
|
||
|
* fw_id is blatted so that it won't look valid if it leaks out.
|
||
|
*/
|
||
|
encap->fw_id = MC_CMD_MAE_OUTER_RULE_INSERT_OUT_OUTER_RULE_ID_NULL;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_populate_lhs_match_criteria(MCDI_DECLARE_STRUCT_PTR(match_crit),
|
||
|
const struct efx_tc_match *match)
|
||
|
{
|
||
|
if (match->mask.ingress_port) {
|
||
|
if (~match->mask.ingress_port)
|
||
|
return -EOPNOTSUPP;
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit,
|
||
|
MAE_ENC_FIELD_PAIRS_INGRESS_MPORT_SELECTOR,
|
||
|
match->value.ingress_port);
|
||
|
}
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit, MAE_ENC_FIELD_PAIRS_INGRESS_MPORT_SELECTOR_MASK,
|
||
|
match->mask.ingress_port);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE,
|
||
|
match->value.eth_proto);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE_MASK,
|
||
|
match->mask.eth_proto);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_TCI_BE,
|
||
|
match->value.vlan_tci[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_TCI_BE_MASK,
|
||
|
match->mask.vlan_tci[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_PROTO_BE,
|
||
|
match->value.vlan_proto[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_PROTO_BE_MASK,
|
||
|
match->mask.vlan_proto[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_TCI_BE,
|
||
|
match->value.vlan_tci[1]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_TCI_BE_MASK,
|
||
|
match->mask.vlan_tci[1]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_PROTO_BE,
|
||
|
match->value.vlan_proto[1]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_PROTO_BE_MASK,
|
||
|
match->mask.vlan_proto[1]);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_SADDR_BE),
|
||
|
match->value.eth_saddr, ETH_ALEN);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_SADDR_BE_MASK),
|
||
|
match->mask.eth_saddr, ETH_ALEN);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_DADDR_BE),
|
||
|
match->value.eth_daddr, ETH_ALEN);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_DADDR_BE_MASK),
|
||
|
match->mask.eth_daddr, ETH_ALEN);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO,
|
||
|
match->value.ip_proto);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO_MASK,
|
||
|
match->mask.ip_proto);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS,
|
||
|
match->value.ip_tos);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS_MASK,
|
||
|
match->mask.ip_tos);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TTL,
|
||
|
match->value.ip_ttl);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TTL_MASK,
|
||
|
match->mask.ip_ttl);
|
||
|
MCDI_STRUCT_POPULATE_BYTE_1(match_crit,
|
||
|
MAE_ENC_FIELD_PAIRS_ENC_VLAN_FLAGS,
|
||
|
MAE_ENC_FIELD_PAIRS_ENC_IP_FRAG,
|
||
|
match->value.ip_frag);
|
||
|
MCDI_STRUCT_POPULATE_BYTE_1(match_crit,
|
||
|
MAE_ENC_FIELD_PAIRS_ENC_VLAN_FLAGS_MASK,
|
||
|
MAE_ENC_FIELD_PAIRS_ENC_IP_FRAG_MASK,
|
||
|
match->mask.ip_frag);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE,
|
||
|
match->value.src_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE_MASK,
|
||
|
match->mask.src_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE,
|
||
|
match->value.dst_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE_MASK,
|
||
|
match->mask.dst_ip);
|
||
|
#ifdef CONFIG_IPV6
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE),
|
||
|
&match->value.src_ip6, sizeof(struct in6_addr));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE_MASK),
|
||
|
&match->mask.src_ip6, sizeof(struct in6_addr));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE),
|
||
|
&match->value.dst_ip6, sizeof(struct in6_addr));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE_MASK),
|
||
|
&match->mask.dst_ip6, sizeof(struct in6_addr));
|
||
|
#endif
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_SPORT_BE,
|
||
|
match->value.l4_sport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_SPORT_BE_MASK,
|
||
|
match->mask.l4_sport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE,
|
||
|
match->value.l4_dport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE_MASK,
|
||
|
match->mask.l4_dport);
|
||
|
/* No enc-keys in LHS rules. Caps check should have caught this; any
|
||
|
* enc-keys from an fLHS should have been translated to regular keys
|
||
|
* and any EM should be a pseudo (we're an OR so can't have a direct
|
||
|
* EM with another OR).
|
||
|
*/
|
||
|
if (WARN_ON_ONCE(match->encap && !match->encap->type))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(match->mask.enc_src_ip))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(match->mask.enc_dst_ip))
|
||
|
return -EOPNOTSUPP;
|
||
|
#ifdef CONFIG_IPV6
|
||
|
if (WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_src_ip6)))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_dst_ip6)))
|
||
|
return -EOPNOTSUPP;
|
||
|
#endif
|
||
|
if (WARN_ON_ONCE(match->mask.enc_ip_tos))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(match->mask.enc_ip_ttl))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(match->mask.enc_sport))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(match->mask.enc_dport))
|
||
|
return -EOPNOTSUPP;
|
||
|
if (WARN_ON_ONCE(match->mask.enc_keyid))
|
||
|
return -EOPNOTSUPP;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_insert_lhs_outer_rule(struct efx_nic *efx,
|
||
|
struct efx_tc_lhs_rule *rule, u32 prio)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_INSERT_IN_LEN(MAE_ENC_FIELD_PAIRS_LEN));
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_INSERT_OUT_LEN);
|
||
|
MCDI_DECLARE_STRUCT_PTR(match_crit);
|
||
|
const struct efx_tc_lhs_action *act;
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_PRIO, prio);
|
||
|
/* match */
|
||
|
match_crit = _MCDI_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_FIELD_MATCH_CRITERIA);
|
||
|
rc = efx_mae_populate_lhs_match_criteria(match_crit, &rule->match);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
|
||
|
/* action */
|
||
|
act = &rule->lhs_act;
|
||
|
rc = efx_mae_encap_type_to_mae_type(act->tun_type);
|
||
|
if (rc < 0)
|
||
|
return rc;
|
||
|
MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_ENCAP_TYPE, rc);
|
||
|
/* We always inhibit CT lookup on TCP_INTERESTING_FLAGS, since the
|
||
|
* SW path needs to process the packet to update the conntrack tables
|
||
|
* on connection establishment (SYN) or termination (FIN, RST).
|
||
|
*/
|
||
|
MCDI_POPULATE_DWORD_6(inbuf, MAE_OUTER_RULE_INSERT_IN_LOOKUP_CONTROL,
|
||
|
MAE_OUTER_RULE_INSERT_IN_DO_CT, !!act->zone,
|
||
|
MAE_OUTER_RULE_INSERT_IN_CT_TCP_FLAGS_INHIBIT, 1,
|
||
|
MAE_OUTER_RULE_INSERT_IN_CT_DOMAIN,
|
||
|
act->zone ? act->zone->zone : 0,
|
||
|
MAE_OUTER_RULE_INSERT_IN_CT_VNI_MODE,
|
||
|
MAE_CT_VNI_MODE_ZERO,
|
||
|
MAE_OUTER_RULE_INSERT_IN_DO_COUNT, !!act->count,
|
||
|
MAE_OUTER_RULE_INSERT_IN_RECIRC_ID,
|
||
|
act->rid ? act->rid->fw_id : 0);
|
||
|
if (act->count)
|
||
|
MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_COUNTER_ID,
|
||
|
act->count->cnt->fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_INSERT, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
rule->fw_id = MCDI_DWORD(outbuf, MAE_OUTER_RULE_INSERT_OUT_OR_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_populate_match_criteria(MCDI_DECLARE_STRUCT_PTR(match_crit),
|
||
|
const struct efx_tc_match *match);
|
||
|
|
||
|
static int efx_mae_insert_lhs_action_rule(struct efx_nic *efx,
|
||
|
struct efx_tc_lhs_rule *rule,
|
||
|
u32 prio)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_INSERT_IN_LEN(MAE_FIELD_MASK_VALUE_PAIRS_V2_LEN));
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_RULE_INSERT_OUT_LEN);
|
||
|
struct efx_tc_lhs_action *act = &rule->lhs_act;
|
||
|
MCDI_DECLARE_STRUCT_PTR(match_crit);
|
||
|
MCDI_DECLARE_STRUCT_PTR(response);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
match_crit = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_MATCH_CRITERIA);
|
||
|
response = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_RESPONSE);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID,
|
||
|
MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID,
|
||
|
MC_CMD_MAE_ACTION_SET_ALLOC_OUT_ACTION_SET_ID_NULL);
|
||
|
EFX_POPULATE_DWORD_5(*_MCDI_STRUCT_DWORD(response, MAE_ACTION_RULE_RESPONSE_LOOKUP_CONTROL),
|
||
|
MAE_ACTION_RULE_RESPONSE_DO_CT, !!act->zone,
|
||
|
MAE_ACTION_RULE_RESPONSE_DO_RECIRC,
|
||
|
act->rid && !act->zone,
|
||
|
MAE_ACTION_RULE_RESPONSE_CT_VNI_MODE,
|
||
|
MAE_CT_VNI_MODE_ZERO,
|
||
|
MAE_ACTION_RULE_RESPONSE_RECIRC_ID,
|
||
|
act->rid ? act->rid->fw_id : 0,
|
||
|
MAE_ACTION_RULE_RESPONSE_CT_DOMAIN,
|
||
|
act->zone ? act->zone->zone : 0);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_COUNTER_ID,
|
||
|
act->count ? act->count->cnt->fw_id :
|
||
|
MC_CMD_MAE_COUNTER_ALLOC_OUT_COUNTER_ID_NULL);
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_PRIO, prio);
|
||
|
rc = efx_mae_populate_match_criteria(match_crit, &rule->match);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_INSERT, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
rule->fw_id = MCDI_DWORD(outbuf, MAE_ACTION_RULE_INSERT_OUT_AR_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_insert_lhs_rule(struct efx_nic *efx, struct efx_tc_lhs_rule *rule,
|
||
|
u32 prio)
|
||
|
{
|
||
|
if (rule->is_ar)
|
||
|
return efx_mae_insert_lhs_action_rule(efx, rule, prio);
|
||
|
return efx_mae_insert_lhs_outer_rule(efx, rule, prio);
|
||
|
}
|
||
|
|
||
|
static int efx_mae_remove_lhs_outer_rule(struct efx_nic *efx,
|
||
|
struct efx_tc_lhs_rule *rule)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_REMOVE_IN_OR_ID, rule->fw_id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_REMOVE, inbuf,
|
||
|
sizeof(inbuf), outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should also never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what encap_mds exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_OUTER_RULE_REMOVE_OUT_REMOVED_OR_ID) != rule->fw_id))
|
||
|
return -EIO;
|
||
|
/* We're probably about to free @rule, but let's just make sure its
|
||
|
* fw_id is blatted so that it won't look valid if it leaks out.
|
||
|
*/
|
||
|
rule->fw_id = MC_CMD_MAE_OUTER_RULE_INSERT_OUT_OUTER_RULE_ID_NULL;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_remove_lhs_rule(struct efx_nic *efx, struct efx_tc_lhs_rule *rule)
|
||
|
{
|
||
|
if (rule->is_ar)
|
||
|
return efx_mae_delete_rule(efx, rule->fw_id);
|
||
|
return efx_mae_remove_lhs_outer_rule(efx, rule);
|
||
|
}
|
||
|
|
||
|
/* Populating is done by taking each byte of @value in turn and storing
|
||
|
* it in the appropriate bits of @row. @value must be big-endian; we
|
||
|
* convert it to little-endianness as we go.
|
||
|
*/
|
||
|
static int efx_mae_table_populate(struct efx_tc_table_field_fmt field,
|
||
|
__le32 *row, size_t row_bits,
|
||
|
void *value, size_t value_size)
|
||
|
{
|
||
|
unsigned int i;
|
||
|
|
||
|
/* For now only scheme 0 is supported for any field, so we check here
|
||
|
* (rather than, say, in calling code, which knows the semantics and
|
||
|
* could in principle encode for other schemes).
|
||
|
*/
|
||
|
if (field.scheme)
|
||
|
return -EOPNOTSUPP;
|
||
|
if (DIV_ROUND_UP(field.width, 8) != value_size)
|
||
|
return -EINVAL;
|
||
|
if (field.lbn + field.width > row_bits)
|
||
|
return -EINVAL;
|
||
|
for (i = 0; i < value_size; i++) {
|
||
|
unsigned int bn = field.lbn + i * 8;
|
||
|
unsigned int wn = bn / 32;
|
||
|
u64 v;
|
||
|
|
||
|
v = ((u8 *)value)[value_size - i - 1];
|
||
|
v <<= (bn % 32);
|
||
|
row[wn] |= cpu_to_le32(v & 0xffffffff);
|
||
|
if (wn * 32 < row_bits)
|
||
|
row[wn + 1] |= cpu_to_le32(v >> 32);
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_table_populate_bool(struct efx_tc_table_field_fmt field,
|
||
|
__le32 *row, size_t row_bits, bool value)
|
||
|
{
|
||
|
u8 v = value ? 1 : 0;
|
||
|
|
||
|
if (field.width != 1)
|
||
|
return -EINVAL;
|
||
|
return efx_mae_table_populate(field, row, row_bits, &v, 1);
|
||
|
}
|
||
|
|
||
|
static int efx_mae_table_populate_ipv4(struct efx_tc_table_field_fmt field,
|
||
|
__le32 *row, size_t row_bits, __be32 value)
|
||
|
{
|
||
|
/* IPv4 is placed in the first 4 bytes of an IPv6-sized field */
|
||
|
struct in6_addr v = {};
|
||
|
|
||
|
if (field.width != 128)
|
||
|
return -EINVAL;
|
||
|
v.s6_addr32[0] = value;
|
||
|
return efx_mae_table_populate(field, row, row_bits, &v, sizeof(v));
|
||
|
}
|
||
|
|
||
|
static int efx_mae_table_populate_u24(struct efx_tc_table_field_fmt field,
|
||
|
__le32 *row, size_t row_bits, u32 value)
|
||
|
{
|
||
|
__be32 v = cpu_to_be32(value);
|
||
|
|
||
|
/* We adjust value_size here since just 3 bytes will be copied, and
|
||
|
* the pointer to the value is set discarding the first byte which is
|
||
|
* the most significant byte for a big-endian 4-bytes value.
|
||
|
*/
|
||
|
return efx_mae_table_populate(field, row, row_bits, ((void *)&v) + 1,
|
||
|
sizeof(v) - 1);
|
||
|
}
|
||
|
|
||
|
#define _TABLE_POPULATE(dst, dw, _field, _value) ({ \
|
||
|
typeof(_value) _v = _value; \
|
||
|
\
|
||
|
(_field.width == sizeof(_value) * 8) ? \
|
||
|
efx_mae_table_populate(_field, dst, dw, &_v, \
|
||
|
sizeof(_v)) : -EINVAL; \
|
||
|
})
|
||
|
#define TABLE_POPULATE_KEY_IPV4(dst, _table, _field, _value) \
|
||
|
efx_mae_table_populate_ipv4(efx->tc->meta_##_table.desc.keys \
|
||
|
[efx->tc->meta_##_table.keys._field##_idx],\
|
||
|
dst, efx->tc->meta_##_table.desc.key_width,\
|
||
|
_value)
|
||
|
#define TABLE_POPULATE_KEY(dst, _table, _field, _value) \
|
||
|
_TABLE_POPULATE(dst, efx->tc->meta_##_table.desc.key_width, \
|
||
|
efx->tc->meta_##_table.desc.keys \
|
||
|
[efx->tc->meta_##_table.keys._field##_idx], \
|
||
|
_value)
|
||
|
|
||
|
#define TABLE_POPULATE_RESP_BOOL(dst, _table, _field, _value) \
|
||
|
efx_mae_table_populate_bool(efx->tc->meta_##_table.desc.resps \
|
||
|
[efx->tc->meta_##_table.resps._field##_idx],\
|
||
|
dst, efx->tc->meta_##_table.desc.resp_width,\
|
||
|
_value)
|
||
|
#define TABLE_POPULATE_RESP(dst, _table, _field, _value) \
|
||
|
_TABLE_POPULATE(dst, efx->tc->meta_##_table.desc.resp_width, \
|
||
|
efx->tc->meta_##_table.desc.resps \
|
||
|
[efx->tc->meta_##_table.resps._field##_idx], \
|
||
|
_value)
|
||
|
|
||
|
#define TABLE_POPULATE_RESP_U24(dst, _table, _field, _value) \
|
||
|
efx_mae_table_populate_u24(efx->tc->meta_##_table.desc.resps \
|
||
|
[efx->tc->meta_##_table.resps._field##_idx],\
|
||
|
dst, efx->tc->meta_##_table.desc.resp_width,\
|
||
|
_value)
|
||
|
|
||
|
static int efx_mae_populate_ct_key(struct efx_nic *efx, __le32 *key, size_t kw,
|
||
|
struct efx_tc_ct_entry *conn)
|
||
|
{
|
||
|
bool ipv6 = conn->eth_proto == htons(ETH_P_IPV6);
|
||
|
int rc;
|
||
|
|
||
|
rc = TABLE_POPULATE_KEY(key, ct, eth_proto, conn->eth_proto);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_POPULATE_KEY(key, ct, ip_proto, conn->ip_proto);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (ipv6)
|
||
|
rc = TABLE_POPULATE_KEY(key, ct, src_ip, conn->src_ip6);
|
||
|
else
|
||
|
rc = TABLE_POPULATE_KEY_IPV4(key, ct, src_ip, conn->src_ip);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (ipv6)
|
||
|
rc = TABLE_POPULATE_KEY(key, ct, dst_ip, conn->dst_ip6);
|
||
|
else
|
||
|
rc = TABLE_POPULATE_KEY_IPV4(key, ct, dst_ip, conn->dst_ip);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_POPULATE_KEY(key, ct, l4_sport, conn->l4_sport);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
rc = TABLE_POPULATE_KEY(key, ct, l4_dport, conn->l4_dport);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
return TABLE_POPULATE_KEY(key, ct, zone, cpu_to_be16(conn->zone->zone));
|
||
|
}
|
||
|
|
||
|
int efx_mae_insert_ct(struct efx_nic *efx, struct efx_tc_ct_entry *conn)
|
||
|
{
|
||
|
bool ipv6 = conn->eth_proto == htons(ETH_P_IPV6);
|
||
|
__le32 *key = NULL, *resp = NULL;
|
||
|
size_t inlen, kw, rw;
|
||
|
efx_dword_t *inbuf;
|
||
|
int rc = -ENOMEM;
|
||
|
|
||
|
/* Check table access is supported */
|
||
|
if (!efx->tc->meta_ct.hooked)
|
||
|
return -EOPNOTSUPP;
|
||
|
|
||
|
/* key/resp widths are in bits; convert to dwords for IN_LEN */
|
||
|
kw = DIV_ROUND_UP(efx->tc->meta_ct.desc.key_width, 32);
|
||
|
rw = DIV_ROUND_UP(efx->tc->meta_ct.desc.resp_width, 32);
|
||
|
BUILD_BUG_ON(sizeof(__le32) != MC_CMD_TABLE_INSERT_IN_DATA_LEN);
|
||
|
inlen = MC_CMD_TABLE_INSERT_IN_LEN(kw + rw);
|
||
|
if (inlen > MC_CMD_TABLE_INSERT_IN_LENMAX_MCDI2)
|
||
|
return -E2BIG;
|
||
|
inbuf = kzalloc(inlen, GFP_KERNEL);
|
||
|
if (!inbuf)
|
||
|
return -ENOMEM;
|
||
|
|
||
|
key = kcalloc(kw, sizeof(__le32), GFP_KERNEL);
|
||
|
if (!key)
|
||
|
goto out_free;
|
||
|
resp = kcalloc(rw, sizeof(__le32), GFP_KERNEL);
|
||
|
if (!resp)
|
||
|
goto out_free;
|
||
|
|
||
|
rc = efx_mae_populate_ct_key(efx, key, kw, conn);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
|
||
|
rc = TABLE_POPULATE_RESP_BOOL(resp, ct, dnat, conn->dnat);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
/* No support in hw for IPv6 NAT; field is only 32 bits */
|
||
|
if (!ipv6)
|
||
|
rc = TABLE_POPULATE_RESP(resp, ct, nat_ip, conn->nat_ip);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
rc = TABLE_POPULATE_RESP(resp, ct, l4_natport, conn->l4_natport);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
rc = TABLE_POPULATE_RESP(resp, ct, mark, cpu_to_be32(conn->mark));
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
rc = TABLE_POPULATE_RESP_U24(resp, ct, counter_id, conn->cnt->fw_id);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, TABLE_INSERT_IN_TABLE_ID, TABLE_ID_CONNTRACK_TABLE);
|
||
|
MCDI_SET_WORD(inbuf, TABLE_INSERT_IN_KEY_WIDTH,
|
||
|
efx->tc->meta_ct.desc.key_width);
|
||
|
/* MASK_WIDTH is zero as CT is a BCAM */
|
||
|
MCDI_SET_WORD(inbuf, TABLE_INSERT_IN_RESP_WIDTH,
|
||
|
efx->tc->meta_ct.desc.resp_width);
|
||
|
memcpy(MCDI_PTR(inbuf, TABLE_INSERT_IN_DATA), key, kw * sizeof(__le32));
|
||
|
memcpy(MCDI_PTR(inbuf, TABLE_INSERT_IN_DATA) + kw * sizeof(__le32),
|
||
|
resp, rw * sizeof(__le32));
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_TABLE_INSERT_OUT_LEN);
|
||
|
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_INSERT, inbuf, inlen, NULL, 0, NULL);
|
||
|
|
||
|
out_free:
|
||
|
kfree(resp);
|
||
|
kfree(key);
|
||
|
kfree(inbuf);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
int efx_mae_remove_ct(struct efx_nic *efx, struct efx_tc_ct_entry *conn)
|
||
|
{
|
||
|
__le32 *key = NULL;
|
||
|
efx_dword_t *inbuf;
|
||
|
size_t inlen, kw;
|
||
|
int rc = -ENOMEM;
|
||
|
|
||
|
/* Check table access is supported */
|
||
|
if (!efx->tc->meta_ct.hooked)
|
||
|
return -EOPNOTSUPP;
|
||
|
|
||
|
/* key width is in bits; convert to dwords for IN_LEN */
|
||
|
kw = DIV_ROUND_UP(efx->tc->meta_ct.desc.key_width, 32);
|
||
|
BUILD_BUG_ON(sizeof(__le32) != MC_CMD_TABLE_DELETE_IN_DATA_LEN);
|
||
|
inlen = MC_CMD_TABLE_DELETE_IN_LEN(kw);
|
||
|
if (inlen > MC_CMD_TABLE_DELETE_IN_LENMAX_MCDI2)
|
||
|
return -E2BIG;
|
||
|
inbuf = kzalloc(inlen, GFP_KERNEL);
|
||
|
if (!inbuf)
|
||
|
return -ENOMEM;
|
||
|
|
||
|
key = kcalloc(kw, sizeof(__le32), GFP_KERNEL);
|
||
|
if (!key)
|
||
|
goto out_free;
|
||
|
|
||
|
rc = efx_mae_populate_ct_key(efx, key, kw, conn);
|
||
|
if (rc)
|
||
|
goto out_free;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, TABLE_DELETE_IN_TABLE_ID, TABLE_ID_CONNTRACK_TABLE);
|
||
|
MCDI_SET_WORD(inbuf, TABLE_DELETE_IN_KEY_WIDTH,
|
||
|
efx->tc->meta_ct.desc.key_width);
|
||
|
/* MASK_WIDTH is zero as CT is a BCAM */
|
||
|
/* RESP_WIDTH is zero for DELETE */
|
||
|
memcpy(MCDI_PTR(inbuf, TABLE_DELETE_IN_DATA), key, kw * sizeof(__le32));
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_TABLE_DELETE_OUT_LEN);
|
||
|
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_DELETE, inbuf, inlen, NULL, 0, NULL);
|
||
|
|
||
|
out_free:
|
||
|
kfree(key);
|
||
|
kfree(inbuf);
|
||
|
return rc;
|
||
|
}
|
||
|
|
||
|
static int efx_mae_populate_match_criteria(MCDI_DECLARE_STRUCT_PTR(match_crit),
|
||
|
const struct efx_tc_match *match)
|
||
|
{
|
||
|
if (match->mask.ingress_port) {
|
||
|
if (~match->mask.ingress_port)
|
||
|
return -EOPNOTSUPP;
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_INGRESS_MPORT_SELECTOR,
|
||
|
match->value.ingress_port);
|
||
|
}
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_INGRESS_MPORT_SELECTOR_MASK,
|
||
|
match->mask.ingress_port);
|
||
|
EFX_POPULATE_DWORD_5(*_MCDI_STRUCT_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_FLAGS),
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_DO_CT,
|
||
|
match->value.ct_state_trk,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_HIT,
|
||
|
match->value.ct_state_est,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_IS_IP_FRAG,
|
||
|
match->value.ip_frag,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_FIRST_FRAG,
|
||
|
match->value.ip_firstfrag,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_SYN_FIN_RST,
|
||
|
match->value.tcp_syn_fin_rst);
|
||
|
EFX_POPULATE_DWORD_5(*_MCDI_STRUCT_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_FLAGS_MASK),
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_DO_CT,
|
||
|
match->mask.ct_state_trk,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_HIT,
|
||
|
match->mask.ct_state_est,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_IS_IP_FRAG,
|
||
|
match->mask.ip_frag,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_FIRST_FRAG,
|
||
|
match->mask.ip_firstfrag,
|
||
|
MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_SYN_FIN_RST,
|
||
|
match->mask.tcp_syn_fin_rst);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_RECIRC_ID,
|
||
|
match->value.recirc_id);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_RECIRC_ID_MASK,
|
||
|
match->mask.recirc_id);
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_MARK,
|
||
|
match->value.ct_mark);
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_MARK_MASK,
|
||
|
match->mask.ct_mark);
|
||
|
MCDI_STRUCT_SET_WORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_DOMAIN,
|
||
|
match->value.ct_zone);
|
||
|
MCDI_STRUCT_SET_WORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_DOMAIN_MASK,
|
||
|
match->mask.ct_zone);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETHER_TYPE_BE,
|
||
|
match->value.eth_proto);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETHER_TYPE_BE_MASK,
|
||
|
match->mask.eth_proto);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_TCI_BE,
|
||
|
match->value.vlan_tci[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_TCI_BE_MASK,
|
||
|
match->mask.vlan_tci[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_PROTO_BE,
|
||
|
match->value.vlan_proto[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_PROTO_BE_MASK,
|
||
|
match->mask.vlan_proto[0]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_TCI_BE,
|
||
|
match->value.vlan_tci[1]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_TCI_BE_MASK,
|
||
|
match->mask.vlan_tci[1]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_PROTO_BE,
|
||
|
match->value.vlan_proto[1]);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_PROTO_BE_MASK,
|
||
|
match->mask.vlan_proto[1]);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_SADDR_BE),
|
||
|
match->value.eth_saddr, ETH_ALEN);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_SADDR_BE_MASK),
|
||
|
match->mask.eth_saddr, ETH_ALEN);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_DADDR_BE),
|
||
|
match->value.eth_daddr, ETH_ALEN);
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_DADDR_BE_MASK),
|
||
|
match->mask.eth_daddr, ETH_ALEN);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_PROTO,
|
||
|
match->value.ip_proto);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_PROTO_MASK,
|
||
|
match->mask.ip_proto);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TOS,
|
||
|
match->value.ip_tos);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TOS_MASK,
|
||
|
match->mask.ip_tos);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TTL,
|
||
|
match->value.ip_ttl);
|
||
|
MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TTL_MASK,
|
||
|
match->mask.ip_ttl);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP4_BE,
|
||
|
match->value.src_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP4_BE_MASK,
|
||
|
match->mask.src_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP4_BE,
|
||
|
match->value.dst_ip);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP4_BE_MASK,
|
||
|
match->mask.dst_ip);
|
||
|
#ifdef CONFIG_IPV6
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP6_BE),
|
||
|
&match->value.src_ip6, sizeof(struct in6_addr));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP6_BE_MASK),
|
||
|
&match->mask.src_ip6, sizeof(struct in6_addr));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP6_BE),
|
||
|
&match->value.dst_ip6, sizeof(struct in6_addr));
|
||
|
memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP6_BE_MASK),
|
||
|
&match->mask.dst_ip6, sizeof(struct in6_addr));
|
||
|
#endif
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_SPORT_BE,
|
||
|
match->value.l4_sport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_SPORT_BE_MASK,
|
||
|
match->mask.l4_sport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_DPORT_BE,
|
||
|
match->value.l4_dport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_DPORT_BE_MASK,
|
||
|
match->mask.l4_dport);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_FLAGS_BE,
|
||
|
match->value.tcp_flags);
|
||
|
MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_FLAGS_BE_MASK,
|
||
|
match->mask.tcp_flags);
|
||
|
/* enc-keys are handled indirectly, through encap_match ID */
|
||
|
if (match->encap) {
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_OUTER_RULE_ID,
|
||
|
match->encap->fw_id);
|
||
|
MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_OUTER_RULE_ID_MASK,
|
||
|
U32_MAX);
|
||
|
/* enc_keyid (VNI/VSID) is not part of the encap_match */
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ENC_VNET_ID_BE,
|
||
|
match->value.enc_keyid);
|
||
|
MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ENC_VNET_ID_BE_MASK,
|
||
|
match->mask.enc_keyid);
|
||
|
} else if (WARN_ON_ONCE(match->mask.enc_src_ip) ||
|
||
|
WARN_ON_ONCE(match->mask.enc_dst_ip) ||
|
||
|
WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_src_ip6)) ||
|
||
|
WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_dst_ip6)) ||
|
||
|
WARN_ON_ONCE(match->mask.enc_ip_tos) ||
|
||
|
WARN_ON_ONCE(match->mask.enc_ip_ttl) ||
|
||
|
WARN_ON_ONCE(match->mask.enc_sport) ||
|
||
|
WARN_ON_ONCE(match->mask.enc_dport) ||
|
||
|
WARN_ON_ONCE(match->mask.enc_keyid)) {
|
||
|
/* No enc-keys should appear in a rule without an encap_match */
|
||
|
return -EOPNOTSUPP;
|
||
|
}
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_insert_rule(struct efx_nic *efx, const struct efx_tc_match *match,
|
||
|
u32 prio, u32 acts_id, u32 *id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_INSERT_IN_LEN(MAE_FIELD_MASK_VALUE_PAIRS_V2_LEN));
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_RULE_INSERT_OUT_LEN);
|
||
|
MCDI_DECLARE_STRUCT_PTR(match_crit);
|
||
|
MCDI_DECLARE_STRUCT_PTR(response);
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
if (!id)
|
||
|
return -EINVAL;
|
||
|
|
||
|
match_crit = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_MATCH_CRITERIA);
|
||
|
response = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_RESPONSE);
|
||
|
if (efx_mae_asl_id(acts_id)) {
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, acts_id);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID,
|
||
|
MC_CMD_MAE_ACTION_SET_ALLOC_OUT_ACTION_SET_ID_NULL);
|
||
|
} else {
|
||
|
/* We only had one AS, so we didn't wrap it in an ASL */
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID,
|
||
|
MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, acts_id);
|
||
|
}
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_PRIO, prio);
|
||
|
rc = efx_mae_populate_match_criteria(match_crit, match);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_INSERT, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
*id = MCDI_DWORD(outbuf, MAE_ACTION_RULE_INSERT_OUT_AR_ID);
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_mae_update_rule(struct efx_nic *efx, u32 acts_id, u32 id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_UPDATE_IN_LEN);
|
||
|
MCDI_DECLARE_STRUCT_PTR(response);
|
||
|
|
||
|
BUILD_BUG_ON(MC_CMD_MAE_ACTION_RULE_UPDATE_OUT_LEN);
|
||
|
response = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_UPDATE_IN_RESPONSE);
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_UPDATE_IN_AR_ID, id);
|
||
|
if (efx_mae_asl_id(acts_id)) {
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, acts_id);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID,
|
||
|
MC_CMD_MAE_ACTION_SET_ALLOC_OUT_ACTION_SET_ID_NULL);
|
||
|
} else {
|
||
|
/* We only had one AS, so we didn't wrap it in an ASL */
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID,
|
||
|
MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL);
|
||
|
MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, acts_id);
|
||
|
}
|
||
|
return efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_UPDATE, inbuf, sizeof(inbuf),
|
||
|
NULL, 0, NULL);
|
||
|
}
|
||
|
|
||
|
int efx_mae_delete_rule(struct efx_nic *efx, u32 id)
|
||
|
{
|
||
|
MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_RULE_DELETE_OUT_LEN(1));
|
||
|
MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_DELETE_IN_LEN(1));
|
||
|
size_t outlen;
|
||
|
int rc;
|
||
|
|
||
|
MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_DELETE_IN_AR_ID, id);
|
||
|
rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_DELETE, inbuf, sizeof(inbuf),
|
||
|
outbuf, sizeof(outbuf), &outlen);
|
||
|
if (rc)
|
||
|
return rc;
|
||
|
if (outlen < sizeof(outbuf))
|
||
|
return -EIO;
|
||
|
/* FW freed a different ID than we asked for, should also never happen.
|
||
|
* Warn because it means we've now got a different idea to the FW of
|
||
|
* what rules exist, which could cause mayhem later.
|
||
|
*/
|
||
|
if (WARN_ON(MCDI_DWORD(outbuf, MAE_ACTION_RULE_DELETE_OUT_DELETED_AR_ID) != id))
|
||
|
return -EIO;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
int efx_init_mae(struct efx_nic *efx)
|
||
|
{
|
||
|
struct ef100_nic_data *nic_data = efx->nic_data;
|
||
|
struct efx_mae *mae;
|
||
|
int rc;
|
||
|
|
||
|
if (!nic_data->have_mport)
|
||
|
return -EINVAL;
|
||
|
|
||
|
mae = kmalloc(sizeof(*mae), GFP_KERNEL);
|
||
|
if (!mae)
|
||
|
return -ENOMEM;
|
||
|
|
||
|
rc = rhashtable_init(&mae->mports_ht, &efx_mae_mports_ht_params);
|
||
|
if (rc < 0) {
|
||
|
kfree(mae);
|
||
|
return rc;
|
||
|
}
|
||
|
efx->mae = mae;
|
||
|
mae->efx = efx;
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
void efx_fini_mae(struct efx_nic *efx)
|
||
|
{
|
||
|
struct efx_mae *mae = efx->mae;
|
||
|
|
||
|
kfree(mae);
|
||
|
efx->mae = NULL;
|
||
|
}
|